CVE-2025-14799: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in neeraj_slit Brevo – Email, SMS, Web Push, Chat, and more.
The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.
AI Analysis
Technical Summary
CVE-2025-14799 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, or Type Confusion) found in the Brevo – Email, SMS, Web Push, Chat, and more. WordPress plugin developed by neeraj_slit. The flaw is due to the use of PHP loose comparison (==) instead of strict comparison (===) when validating the installation ID parameter in the REST API endpoint /wp-json/mailin/v1/mailin_disconnect. Because PHP's loose comparison allows different data types to be considered equal (e.g., boolean true == string 'somevalue'), an attacker can bypass authorization checks by sending a boolean true value for the 'id' parameter. This bypass enables unauthenticated attackers to forcibly disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings. The vulnerability affects all plugin versions up to and including 3.3.0. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact on integrity and availability but not confidentiality. No known exploits have been reported yet. The vulnerability could lead to denial of service of Brevo-related communication features and loss of configuration, which may disrupt marketing and customer engagement workflows. The root cause is improper type handling in authorization logic, a common PHP security pitfall.
Potential Impact
For European organizations using the Brevo WordPress plugin, this vulnerability could result in unauthorized disruption of critical communication channels such as email, SMS, web push notifications, and chat services. The ability for unauthenticated attackers to reset plugin settings and delete API keys could lead to service outages, loss of subscriber data, and interruption of marketing campaigns. This may cause reputational damage, reduced customer engagement, and potential regulatory compliance issues, especially under GDPR if subscriber data is affected or lost. Organizations relying heavily on Brevo for customer communications or transactional messaging could experience operational impacts. Additionally, attackers could leverage the disruption to conduct further attacks or social engineering by exploiting the downtime or altered communication flows. The vulnerability’s network accessibility and lack of authentication requirement increase the risk of widespread exploitation if not mitigated promptly.
Mitigation Recommendations
1. Upgrade the Brevo plugin to a version where this vulnerability is patched once available. Monitor the vendor's official channels for updates. 2. As an immediate workaround, restrict access to the /wp-json/mailin/v1/mailin_disconnect REST API endpoint using web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. 3. Implement strict input validation and type checking in any custom code interacting with the plugin or its API endpoints. 4. Regularly back up plugin settings and subscriber data to enable quick restoration in case of unauthorized resets. 5. Monitor WordPress logs and API access logs for unusual requests to the vulnerable endpoint, especially those containing boolean or unexpected parameter values. 6. Employ security plugins that can detect and block suspicious REST API calls. 7. Educate site administrators about the risks of using plugins with known vulnerabilities and encourage timely patching and security hygiene. 8. Consider isolating critical communication plugins in a staging environment before deployment to production to detect such issues early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14799: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in neeraj_slit Brevo – Email, SMS, Web Push, Chat, and more.
Description
The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.
AI-Powered Analysis
Technical Analysis
CVE-2025-14799 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, or Type Confusion) found in the Brevo – Email, SMS, Web Push, Chat, and more. WordPress plugin developed by neeraj_slit. The flaw is due to the use of PHP loose comparison (==) instead of strict comparison (===) when validating the installation ID parameter in the REST API endpoint /wp-json/mailin/v1/mailin_disconnect. Because PHP's loose comparison allows different data types to be considered equal (e.g., boolean true == string 'somevalue'), an attacker can bypass authorization checks by sending a boolean true value for the 'id' parameter. This bypass enables unauthenticated attackers to forcibly disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings. The vulnerability affects all plugin versions up to and including 3.3.0. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact on integrity and availability but not confidentiality. No known exploits have been reported yet. The vulnerability could lead to denial of service of Brevo-related communication features and loss of configuration, which may disrupt marketing and customer engagement workflows. The root cause is improper type handling in authorization logic, a common PHP security pitfall.
Potential Impact
For European organizations using the Brevo WordPress plugin, this vulnerability could result in unauthorized disruption of critical communication channels such as email, SMS, web push notifications, and chat services. The ability for unauthenticated attackers to reset plugin settings and delete API keys could lead to service outages, loss of subscriber data, and interruption of marketing campaigns. This may cause reputational damage, reduced customer engagement, and potential regulatory compliance issues, especially under GDPR if subscriber data is affected or lost. Organizations relying heavily on Brevo for customer communications or transactional messaging could experience operational impacts. Additionally, attackers could leverage the disruption to conduct further attacks or social engineering by exploiting the downtime or altered communication flows. The vulnerability’s network accessibility and lack of authentication requirement increase the risk of widespread exploitation if not mitigated promptly.
Mitigation Recommendations
1. Upgrade the Brevo plugin to a version where this vulnerability is patched once available. Monitor the vendor's official channels for updates. 2. As an immediate workaround, restrict access to the /wp-json/mailin/v1/mailin_disconnect REST API endpoint using web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. 3. Implement strict input validation and type checking in any custom code interacting with the plugin or its API endpoints. 4. Regularly back up plugin settings and subscriber data to enable quick restoration in case of unauthorized resets. 5. Monitor WordPress logs and API access logs for unusual requests to the vulnerable endpoint, especially those containing boolean or unexpected parameter values. 6. Employ security plugins that can detect and block suspicious REST API calls. 7. Educate site administrators about the risks of using plugins with known vulnerabilities and encourage timely patching and security hygiene. 8. Consider isolating critical communication plugins in a staging environment before deployment to production to detect such issues early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-16T19:50:41.434Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995a2d880d747be206547e8
Added to database: 2/18/2026, 11:30:32 AM
Last enriched: 2/18/2026, 11:44:50 AM
Last updated: 2/21/2026, 2:16:50 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.